Generated:
at:
22.03.2023 09:04 +0800with: 3.2.4Target:
Workspace:
EEA3ABE2DF5E9207AE69D54E0763122BGroup: com.vonzhou.learningArtifact: SpringInActionVersion: 0.0.1
Aggregated projects (29) +
Links: |
Analysis Result: SuccessNo vulnerabilities, thus, no build exception is thrownThe findings presented below represent archives containing code that is subject to a specific vulnerability. Expand to see the vulnerability description and the CVSS score (if any). While the first table column indicates that vulnerable code is contained, the other two columns show whether that vulnerable code is reachable according to the static and dynamic analyses (if performed using the respective analysis goals). Hover over the table cells to see the full identifier (GAV) of the affected application project as well as details about the respective dependency.Used Configuration SettingsexceptionThreshold: noExceptionSpecifies if and when the plugin will throw a build exception. Possible values (default: dependsOn):
Exempted scopes: TEST, PROVIDEDList of scopes that will be ignored (exempted) when deciding whether to throw a build exception.Example: vulas.report.exemptScope = test, provided Possible values: compile, provided, runtime, test, system Default: [test, provided] Exempted bugs:List of security vulnerabilities that will be ignored (exempted) when deciding whether to throw a build exception.Example: vulas.report.exemptBug.CVE-2014-0050.reason = Lorem ipsum Default: none |
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|
| Includes vulnerable code | Potentially executes vulnerable code | Executes vulnerable code |
|---|---|---|
|
|
|